Apache HTTP Server: mod_proxy_uwsgi HTTP response splitting
CVE-2023-27522

7.5HIGH

Key Information:

Vendor
Apache
Vendor
CVE Published:
7 March 2023

Summary

An HTTP Response Smuggling vulnerability exists within the Apache HTTP Server, specifically when using the mod_proxy_uwsgi module. This issue allows attackers to manipulate the origin response header by using special characters, potentially resulting in the truncation or improper splitting of responses forwarded to clients. Versions affected include Apache HTTP Server from 2.4.30 to 2.4.55, posing a risk to the integrity of web transactions and communications.

Affected Version(s)

Apache HTTP Server 2.4.30 <= 2.4.55

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Dimas Fariski Setyawan Putra (nyxsorcerer)
.